PrepAway - Latest Free Exam Questions & Answers

The logical exposure associated with the use of a checkpoint restart procedure is:

The logical exposure associated with the use of a checkpoint restart procedure is:

PrepAway - Latest Free Exam Questions & Answers

A.
denial of service.

B.
an asynchronous attack.

C.
wire tapping.

D.
computer shutdown.

Explanation:

Asynchronous attacks are operating system-based attacks. A checkpoint restart is a feature that
stops a program at specified intermediate points for later restart in an orderly manner without
losing data at the checkpoint. The operating system savesa copy of the computer programs and
data in their current state as well as several system parameters describing the mode and security
level of the program at the time of stoppage. An asynchronous attack occurs when an individual
with access to this information is able to gain access to the checkpoint restart copy of the system
parameters and change those parameters such that upon restart the program would function at a
higher-priority security level.


Leave a Reply